Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems

被引:0
|
作者
Hasan, MA [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Because of their shorter key sizes, cryptosystems based on elliptic curves are being increasingly used in practical applications. A special class of elliptic curves, namely, Koblitz curves, offers an additional but crucial advantage of considerably reduced processing time. In this article, power analysis attacks are applied to cryptosystems that use scalar multiplication on Koblitz curves. Both the simple and the differential power analysis attacks are considered and a number of countermeasures are suggested. While the proposed countermeasures against the simple power analysis attacks rely on making the power consumption for the elliptic curve scalar multiplication independent of the secret key, those for the differential power analysis attacks depend on randomizing the secret key prior to each execution of the scalar multiplication.
引用
收藏
页码:93 / 108
页数:16
相关论文
共 50 条
  • [1] Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems
    Hasan, MA
    IEEE TRANSACTIONS ON COMPUTERS, 2001, 50 (10) : 1071 - 1083
  • [2] New countermeasures against power analysis attacks for Koblitz curve cryptosystems
    Jang, Yong-hee
    Takagi, Naofumi
    Takagi, Kazuyoshi
    Kwon, Yong-jin
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1303 - 1306
  • [3] Koblitz curve cryptosystems
    Lange, T
    FINITE FIELDS AND THEIR APPLICATIONS, 2005, 11 (02) : 200 - 229
  • [4] Efficient countermeasures against power analysis for elliptic curve cryptosystems
    Itoh, K
    Izu, T
    Takenaka, M
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI, 2004, 153 : 99 - 113
  • [5] Countermeasures against differential power analysis for hyperelliptic curve cryptosystems
    Avanzi, RM
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 366 - 381
  • [6] Simple Power Analysis on Elliptic Curve Cryptosystems and Countermeasures: Practical Work
    Wu, Keke
    Li, Huiyun
    Chen, Tingding
    Yu, Fengqi
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 21 - +
  • [7] Enhancing simple power-analysis attacks on elliptic curve cryptosystems
    Oswald, E
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 82 - 97
  • [8] A novel algebraic approach to power analysis attack-resistant countermeasure for Koblitz curve cryptosystems in mobile devices
    Kasiri, Behzad
    Shahhoseini, Hadi Sahriar
    Meshgi, Hadi
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1020 - +
  • [9] Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
    Kiss, Agnes
    Kraemer, Juliane
    Rauzy, Pablo
    Seifert, Jean-Pierre
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016, 2016, 9689 : 111 - 129
  • [10] Power analysis attacks and countermeasures
    Popp, Thomas
    Mangard, Stefan
    Oswald, Elisabeth
    IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 535 - 543